Hi [[ session.user.profile.firstName ]]

Cloud Security Alliance: CloudBytes

  • Date
  • Rating
  • Views
  • CASB 2.0: The Next Frontier for CASB
    CASB 2.0: The Next Frontier for CASB Deena Thomchick of Symantec Recorded: Oct 17 2017 50 mins
    The rapid adoption of cloud applications and services has fueled the need for new security solutions, such as Cloud Access Security Brokers (CASBs). But how do these systems weave into your overall security infrastructure? There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security into their environment. This talk will explore this next frontier of CASB solutions.
  • Securing the Open Enterprise - API Security Threats, Risks and Solutions
    Securing the Open Enterprise - API Security Threats, Risks and Solutions Ron Speed of TrustedImpact Recorded: Oct 10 2017 53 mins
    Enterprises around the globe are rapidly opening up their back-end systems and databases to the outside world using APIs. Drivers for doing this include everything from improving customer service, to monetizing corporate information assets and meeting regulatory requirements. For businesses and systems, however, that were never designed to be opened up to the outside world, APIs can expose them to a whole new range of major security threats and attacks. This webinar will examine this important and growing industry trend from a vendor-agnostic perspective, including:
    - What are the emerging threats and risks with APIs?
    - What API security controls and practices should be considered and how can cloud-based solutions assist?
    - What to look for when evaluating API security solutions?

    About Ron
    Ron, an IT risk, security and compliance executive, has 20+ years experience in international leadership roles, including Big 4 consulting and financial services. He specializes in “building bridges” between business and IT and working strategically with organizations looking to securely adopt new and emerging technologies, such as cloud, mobility, APIs, big data and IoT. Ron’s a recognized thought leader in such areas as cloud risk management and Fintech / blockchain security.
  • Internal Bug Hunts: Squashing Security Bugs on a Budget
    Internal Bug Hunts: Squashing Security Bugs on a Budget Pieter Ockers - Sr Program Manager at Adobe Recorded: Sep 19 2017 47 mins
    Far too often, testing software for security flaws falls into the “nice-to-have” category, taking a backseat to the demands of the marketplace and inflexible feature release schedules. In addition to the expense of hiring an outside security testing team, testing for and fixing obscure security bugs is a brake on an engineer’s ability to put new code in the hands of their customers. Fortunately, there is a workaround to this dilemma that will allow you to promote application security awareness while helping to reduce security bugs in your applications.

    An internal bug hunt contest - in which your employees compete for prizes by finding and reporting security bugs - enables you to harness the creativity and problem-solving skills of your workforce while reducing security bugs in your applications. It can also help promote a culture of security awareness - without a large security testing budget.

    An internal bug hunt contest can you help you:

    • Find and remediate vulnerabilities before external entities can exploit them
    • Provide a safe platform for your application owners to test for security bugs
    • Promote application security awareness
    • Engage employees outside of the central security team who want to explore the security domain

    In this webcast, you will learn how an internal bug bounty program can help you find security flaws in your applications before criminals or spies, while improving the security culture at your company.
  • Challenges in Data Privacy
    Challenges in Data Privacy Craig Scoon, Consultant in the Risk Advisory Service at Deloitte Recorded: Sep 14 2017 40 mins
    There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
    This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
  • State of Cloud Adoption in Asia Pacific (APAC)
    State of Cloud Adoption in Asia Pacific (APAC) Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore Recorded: Sep 13 2017 36 mins
    Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

    During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Nicola Franchetto of ICT Legal Consulting Recorded: Aug 17 2017 60 mins
    Nicola Franchetto will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Franchetto will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • Backup & Recovery: Your Get out of Ransomware Free Card
    Backup & Recovery: Your Get out of Ransomware Free Card Andrew Nielsen, Chief Trust Officer of Druva and Jim Reavis, CEO of CSA Recorded: Aug 9 2017 62 mins
    Ransomware has become a major concern for organizations around the globe. The U.S. Department of Justice reports that an average of 4,000 ransomware attacks occur daily. These ransomware attacks aren’t just targeting laptops and other end-user devices either. Servers are equally at risk of ransomware attacks as well. There’s good news though - your backup data can be difference between being held hostage and easily recovering from an attack.

    Join security experts, Andrew Nielsen, Chief Trust Officer from Druva and Jim Reavis, CEO of Cloud Security Alliance to learn:

    ●The top vulnerabilities exploited for endpoints and servers
    ●Proactive strategies to protect data before a malicious attack occurs
    ●How to avoid paying the ransom by leveraging your backup data

    All registrants will receive a free copy of Druva’s Annual Ransomware Report: 2017 Survey.

    About the speaker....
    Andrew (aka Drew) has more than 15 years of experience in information security, primarily focused on security architecture and product definition. At Druva, Drew is responsible for defining the security and compliance direction of products and services, and his background in both the private and public sectors gives him unique perspective on current and emerging security trends. Prior to Druva, Drew held various security architecture and product roles at FireEye, Hitachi Data Systems, Silicon Valley Bank, and Raytheon.
  • "Cloud-First" Ransomware - A Technical Analysis
    "Cloud-First" Ransomware - A Technical Analysis Bob Gilbert and Sean Hittel of Netskope Recorded: Jul 27 2017 43 mins
    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why?  Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time. 
     
    Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them.  These include:
     
    • Virlock, which encrypts files and also infects them, making it a polymorphic file infector 
    • CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    • CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    • The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • Cloud Services and Encryption: Facts, Myths, Perceptions
    Cloud Services and Encryption: Facts, Myths, Perceptions Paul Rich of Microsoft Recorded: Jul 19 2017 61 mins
    Encryption and terms like "BYOK" have surged to the forefront of cloud service discussions. Both security and compliance stakeholders express great interest in encryption and its apparent promises. However, the expectations built upon encryption and control of encryption keys are often founded on assumptions that fail under scrutiny. In this session we will examine the top myths of cloud encryption and look at factors that have contributed to the growing misperceptions. We will also examine regulatory and legal pressures that impact encryption in this this fascinating and evolving area of cloud services and data privacy.

    Key takeaways:
    - The fact and fiction in myths about cloud encryption
    - The importance of thinking of encryption within legal frameworks
    - How to spot encryption snake oil
  • How and Why to Build an Insider Threat Program
    How and Why to Build an Insider Threat Program Jadee Hanson of Code42 Recorded: Jun 20 2017 37 mins
    Jadee Hanson, Director of Security at Code42, provides a behind-the-scenes look at what it's really like to run an insider threat program -- a program in which you can take steps to prevent employees from leaking, exfiltrating, and exposing company information. This webinar will provide cloud security professionals with insider threat examples (and why you should care), recommendations for how to get buy-in from key stakeholders, and lessons learned from someone who has experienced it firsthand.

    About the speaker:
    Jadee Hanson, CISSP, CISA, is a security professional with more than 13 years of experience. Jadee’s passion for security was born out of a computer science internship and developed into a profession with her first role at Deloitte. After 5 years and a lot of travel, Jadee’s consulting experience led her to Target Corp. where she spent 8 years on its security team, building many of the security programs and functions that exist today. Currently, Jadee is the Director of Security at Code42. In addition to her day job, Jadee is also the founder and CEO of a nonprofit, Building Without Borders.

Embed in website or blog